Security Overview

Involve manages events including sourcing, registration, and invitations, as well as post-event tracking and reporting, including hours contributed, pictures uploaded, and employee ratings and comments. With Involve you can also communicate with your entire workforce through an Instagram like interface and collect AI-driven intelligence from sales & customer conversations. Rigorous infrastructure and administrative procedures protect all customer information stored by Involve. We maintain a highly secure environment that meets the physical and data protection requirements demanded by today’s businesses.

Your trust is our most important asset.

Policies and Procedures

Involve policies, procedures, and training address data privacy, security, and regulations including employee background checks, handling of confidential information and data retention. We require all our third-party technology partners to meet the same level of data privacy and security requirements.

Risk Management and Mitigation

Involve monitors for potential incidents related to security and/or privacy. Events are reported through a tracking system and trigger internal alerts, data collection, isolation, correction, and prevention measures. We will notify a customer’s security team about any specific incident.

Vulnerability and Penetration Testing

Involve follows secure coding practices consistent with the Open Web Application Security Project (OWASP) and utilizes peer review throughout the development process.

Business Continuity and Disaster Recovery

Involve technology resources are designed to withstand disruptions in normal operations. All internal systems are cloud-based, enabling execution from multiple locations in the event of a disaster. All customer-provided services are managed in various zones, eliminating single points of failure.

Security Features

Physical Security

Involve uses data centers that are secure, guarded, and monitored 24/7 with video surveillance and intrusion detection systems. Authorized staff must utilize multi-factor authentication to access any data center. All physical access to data centers by AWS employees is logged and audited.

Certifications

Third-party organizations and companies have certified AWS by with numerous laws and compliance regulations including ISO, SOC, and GDPR.

Encryption

All content is stored on Amazon’s Simple Storage Service (S3) and is encrypted at rest. All traffic between the application and the client is encrypted in transmission using HTTPS with industry-standard transport layer security (TLS) technology.

Backups

Systems are backed up regularly with backups stored off-site. If any data is lost or becomes temporarily unavailable, it can be restored from the latest backup. Backups are stored on the Amazon S3 service with high availability and reliability, persisting the data across multiple availability zones.

Involve is Built for the Enterprise

Single Sign-On

We enable enterprises to manage users from a single, central directory.

Product Assortment

We offer different versions of a product to meet the needs of enterprise customers.

Audit Logs

We provide admins with a detailed trail of account activity.

Role Based Access Control

We allow for the separation of privileges by user role.

Change Management

We empower admins with tools and collateral to roll out features and product changes.